Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are we only one prompt away from using AI for evil? #cybersecurity #ai #infosec

Are we only one prompt away from using AI for evil? In this week's episode of The Cybersecurity Defenders Podcast, we explore a concerning reality about AI and cybersecurity. As AI becomes more prevalent within the threat actor community, exploits are being developed faster than humans can patch. The tools that help developers debug code can just as easily be used to weaponize vulnerabilities.

CVE-2025-6515 Prompt Hijacking Attack - How Session Hijacking Affects MCP Ecosystems

JFrog Security Research recently discovered and disclosed multiple CVEs in oatpp-mcp – the Oat++ framework’s implementation of Anthropic’s Model Context Protocol (MCP) standard. Among these, CVE-2025-6515 stood out due to its potential threat of hijacking MCP session IDs. Within the context of MCP we’ve dubbed this new attack technique “Prompt Hijacking“. Your browser does not support the video tag.

AI at Work: How Egnyte Intelligence Goes Beyond Generic Tools

AI isn’t the future, it’s here. Your CEO’s talking about it in board meetings. Your manager wants to know if it'll save time or just add more work. And you? You're wondering if it's going to make your job easier or just add noise. The excitement is justified. McKinsey says nearly 80% of companies are using AI somewhere in their business. But here's what most people miss: very few have gotten it to work across their entire organization. Why?

Yet Another SMB-Related CVE

CISA has just added a new CVE regarding SMB, with a very high CVSS rating. CVE-2025-33073 is a high-severity (CVSS 8.8) vulnerability in the Windows SMB client caused by improper access control (CWE-284). An authenticated attacker can exploit it over the network to gain elevated privileges. Microsoft has issued guidance on how it should be patched and CalCom recommend this be done immediately.

47-day TLS certificates: What's changing and how to prepare

Trust is the foundation of the digital world. Every time a customer visits a website, processes a financial transaction, or connects to a business application, that trust is validated by TLS certificates. For years, TLS certificate lifespans stretched comfortably to 13 months or longer, giving teams ample time to track and renew them before they expired and caused an application outage. In some situations, even manual renewals were viable for longer lifespan certificates. That era is ending.

Zenity Labs & MITRE ATLAS Collaborate to Advance AI Agent Security with the First Release of Agent-Focused TTPs

Zenity Labs worked in collaboration with MITRE ATLAS to incorporate the first 14 agent-focused techniques and subtechniques, extending the framework beyond LLM threats to cover the unique risks posed by AI agents.

Why auditor choice matters more than you think | Heard in the founder chat

Some things in startup life are just for show—job titles, swag drops, maybe even your first “launch.” Your auditor? Not one of them. In this episode of Heard in the Founder Group Chat, Jadee Hanson, Vanta’s CISO, breaks down why your auditor is more than a checkbox — they’re your external seal of trust.

Mend.io Expands AI Native AppSec to Windsurf, CoPilot, Claude Code, and Amazon Q Developer

Today, Mend.io is expanding its AppSec capabilities to secure the five most popular agentic IDEs — including Windsurf, CoPilot, Claude Code, Amazon Q Developer, and Cursor — ensuring that developers can move at AI speed without compromising security.

Cloud Security Tips for Companies

Cloud computing is now central to company operations, but it can also be an opportunity for hackers. As of late last year, 80% of organizations experienced more frequent cloud attacks. Strengthening security is essential. Clear, actionable cloud security tips help protect digital assets with minimal complexity. As companies migrate more services and data to cloud environments, risks grow and become harder to detect.